ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-585307B1CA80
|
Infrastructure Scan
ADDRESS: 0xe63b372958e52a7baf1aa341bdf6413955baf509
DEPLOYED: 2026-05-14 06:20:47
LAST_TX: 2026-05-14 06:36:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 29 iterations. [TRACE] Call sequence: 3e62 -> f02c -> 8c44. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd84f880cc27c1afa821af763b575b0efa921ed2c 0x0452be1c9beedc7e6e93f360d2d3a0df0b1e2bb7 0xbafdd379480bdb0b9b13fca6046e76561fcd952e 0x7051b42f37539fd009329668ac97836eb5385ce3 0xc127de2b9a73425161e83e6fd379339e29ad24d0 0x88442fda2fce3b4b05c34e0b63b9a1b9839876de 0xfcf81f355b6e386f0efed3505b4761a92bc97bee 0x7c5ef3a8dd12572b99d3b2e911581b9c7556aec4 0x2f192592a8934b659b19ce02560f7aec5ac68612 0xe473b45e786c65deebd525a1766dd233c0d022d8 0xc3b3a5c0394e11cf3d8c8d0ced8146cfe038d808 0x407017dc44b80e7bb3c9f197312943e2f591e156 0xeebbb003e3af39662c252b1e615fc227f3518442 0x10fa2e1aabffe9a6ea1946872abd7867d7f3be0d 0x4c0a44a1c0e1a2c82dad4fe03edb8b3cbf3781fc 0xdf9fc78f2db60c33f22788d1f25e9c41629a2c73 0x82fb65168fe6874b8c65b1d48b2fbfc72b3ffbc7 0x4bfa1cf90cd53703433737d8b9427e2d9ab3f218 0x80f48a6c56c1ecce75b4be7cad6ff194861d316a 0x81e64080230565bc0dd3155c7c6081c7e9dbbdf4
